General

  • Target

    d72dcfa96e4df27c90f0acb2024a2774_JaffaCakes118

  • Size

    22.7MB

  • Sample

    240909-16mhlashqj

  • MD5

    d72dcfa96e4df27c90f0acb2024a2774

  • SHA1

    1176fda124f12dc046544335816db9084ab372a3

  • SHA256

    f3a6ffd7fe25a4ffc2de90d1b8c8653bf2fbc0cc1d5dfa5a2674ce0b8bece642

  • SHA512

    bce6746237c80b1339143b7ab570e474f44dde1204391f0217c073ee61d866a045ab21d4fafba86d6ce39bc9ce8894b046a7d77bc4906af82aaf7e7d6a94cab6

  • SSDEEP

    393216:bWlSgFXaHPdWW8T3S1LAFo+IV24+LUQIceKocWtpJaF8hyKyCqHTxYQ:fgpiVW96HV2kvVcspkFiyKOTp

Malware Config

Targets

    • Target

      d72dcfa96e4df27c90f0acb2024a2774_JaffaCakes118

    • Size

      22.7MB

    • MD5

      d72dcfa96e4df27c90f0acb2024a2774

    • SHA1

      1176fda124f12dc046544335816db9084ab372a3

    • SHA256

      f3a6ffd7fe25a4ffc2de90d1b8c8653bf2fbc0cc1d5dfa5a2674ce0b8bece642

    • SHA512

      bce6746237c80b1339143b7ab570e474f44dde1204391f0217c073ee61d866a045ab21d4fafba86d6ce39bc9ce8894b046a7d77bc4906af82aaf7e7d6a94cab6

    • SSDEEP

      393216:bWlSgFXaHPdWW8T3S1LAFo+IV24+LUQIceKocWtpJaF8hyKyCqHTxYQ:fgpiVW96HV2kvVcspkFiyKOTp

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks